Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
SAMPLE DEVELOPMENT ON JAVA SMART-CARD …
AI
The paper provides a comprehensive overview of secure smart-card technologies utilized in e-commerce, highlighting different classifications of smart cards based on communication methods and integrated circuits. It discusses the importance of project management in e-commerce, emphasizing integration management and the essential project management knowledge areas including scope, time, cost, and risk management. Key technologies and tools for effective project management are identified, asserting the significance of a structured approach in enhancing communication and project effectiveness.
IEEE Communications Surveys & Tutorials, 2009
An efficient and strongly secure smart card mechanism involves the use of a technological background taken from the fields of computers, VLSI design and material science. The result of such a mixture is a miniature, fully operational, computation system. The nature of the data involved in smart card transactions and smart card intended uses, introduce another important factor in the smart card design mechanism which is security. The evolution of VLSI technology allows the efficient implementation of costly cryptographic operations in the smart card design methodology. Apart from the traditional cryptographic algorithms, additional techniques and special design materials have been introduced in order to protect the smart card system from cryptanalytic attacks. New architectures of software design, like object-oriented programming, give the opportunity to implement programmable multi-application cards. Thus, smart cards are transformed into highly secure devices and their establishment in the modern computer market can be considered certain. This establishment is bound to finance upcoming research in smart cards so that this product can become the basic component of electronic commerce worldwide.
The International Conference on Electrical Engineering
Smart card is a miniature computer with very limited hardware and software resources. Like any computer, an operating system is needed to manage the card hardware and software resources. Several smart card operating systems of different types were developed for this purpose. The basic functions of these operating systems are: handling the card input/out process, managing the file system, managing communication with card users/ application programs and data exchange with the cryptographic algorithms embedded in the card, if any. The user/application is allowed to interact with cryptographic algorithms with their default parameters and with no possibility of cryptographic parameters customization. This paper aims to make the smart card smarter by presenting a new type of smart card operating system that covers a new area of commands. The new set of cryptographic commands enables the applications/developer to deeply access the cryptographic primitives and customize their building blocks at run time. In order to test the new command set and demonstrate its features, the new operating system has been developed in embedded C language and implemented on an open platform card. Smart Card, Operating System, Cryptographic Primitives. Today, smart cards are widely used in our daily life. Their technology is being used in many fields like: credit cards, passports, health cards, ID cards, driving licenses, SIM cards for mobile phones, etc. Smart cards are originally known as integrated circuit cards (IC cards). The reason for naming IC cards with smart cards is that the card functions are not limited to those functions defined only at build time. The set of card functions could be extended in run time according to the system they work in and also according to user requirements. Smart cards with processor chip need an operating system known as Card Operating System (COS). The basic functions of COS are: managing the card resources, and enabling instructions execution and communication with the outer world. A variety of card operating systems have been developed. * Egyptian Armed Forces.
Smart Cards are often touted as "secure" portable storage devices. A complete, high-level design metodology has been proposed for embedded information systems based on smart card devices. However, this metodology takes as granted that informations stored on the card will be really securely stored, and access control will be correctly maintained. Unfortunately, standards and specifications, created by hardware and software vendors for both the card hardware and the micro operating system which runs it have been repeatedly proven not as secure as they are commonly supposed to be.
IFIP, 2004
Smart card applications often handle privacy-sensitive information‚ and therefore must obey certain security policies. Typically‚ such policies are described as high-level security properties‚ stating for example that no pin verification must take place within a transaction. Behavioural interface specification languages‚ such as JML (Java Modeling Language)‚ have been successfully used to validate functional properties of smart card applications. However‚ high-level security properties cannot directly be expressed in such languages. Therefore‚ this paper proposes a method to translate high-level security properties into JML annotations. The method synthesises appropriate annotations and weaves them throughout the application. In this way‚ security policies can be validated using existing tools for JML. The method is general and applies to a large class of security properties. To validate the method‚ it has been applied to several realistic examples of smart card applications. This allowed us to find violations against the documented security policies for some of these applications.
2000
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
Computer Networks, 2001
This article presents an overview of the cryptographic primitives that are commonly implemented on smart cards. We also discuss attacks that can be mounted on smart cards as well as countermeasures against such attacks. Ó
2018
The concept of smart card dates back to the early seventies.Roland Moreno invented and patented the first smart card system in the year 1974; it was christened T.M.R which stood for take money and run.A smart card is a credit card-sized device that contains one or more integrated circuits (ICs). The card operating system (OS) forms the heart of every microprocessor based smart card. In the earlier times smart card software architecture was monolithic in nature. The present trend for smart card operating systemshows a gradual shift from monolithic application to a multi-application capable platform. The present smart card operating systems are available in both open source and closed source flavours which have very strong multi-applicational capability.
IEEE Micro, 2001
2008 IEEE International Symposium on Consumer Electronics, 2008
A problem with transaction system which requires an open network to carry out operations using a smart card is that the user does not know which information signs with his smart card. In addition, users do not have any proof about the smart card reader authenticity. Architecture of a trustworthy smart card reader to guarantee the correct operations of the smart card is proposed. A secure coprocessor is integrated inside the smart card reader to provide a safe place in order to store sensitive data and support different system level security services. The design includes a barrier substrate, x-ray sensor, temperature sensor and voltage monitors to detect any attempt of modification.
IEEE Transactions on Consumer Electronics, 2004
Smartcard is originally designed as a passive authentication device. Retaining this passive role will limit its potential and it will eventually be superceded by other technologies. Therefore, it is a must for smartcard to take the active role in the near future. In light of this, this paper presents a novel Card-Centric Framework, in which the Smartcard becomes the Master whereas the card-connected terminal only a slave. The system prototype based on current smartcard technologies shows reasonable results, whereas another demo system that makes use of enhanced smartcard technologies provides a significant improvement in user perception and proves the feasibility of the framework in the future. Anticipating technology advancement so that all the performance requirements are met, applications will benefit from the framework in portability, data integrity, and chances for hardware-software customization.
Second IEEE International Security in Storage Workshop, 2003
Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (identification data, cryptographic key, etc). This is why it is often subject to many attacks, as the other parts of the smart card, and thus requires appropriately chosen protections.
International Journal of Networks and Systems, 2024
Smart card technology has emerged as a powerful tool in the field of secure identification, authentication, and transaction processing. This abstract provides a comprehensive overview of smart card technology, highlighting its key features, applications, and benefits. Smart cards, also known as integrated circuit cards, are portable devices that incorporate a microprocessor and memory to securely store and process information. These cards have revolutionized various industries by enabling secure access control, secure payment transactions, and secure storage of sensitive data. The abstract begins by exploring the fundamental components and architecture of smart cards. It delves into the different types of smart cards, such as contact-based and contactless cards, and explains the communication protocols employed in their operation. Furthermore, the abstract discusses the extensive range of applications where smart cards have found widespread adoption. These applications include identification cards, payment cards, healthcare cards, transportation cards, and more. The abstract highlights the advantages of using smart cards in each of these domains, such as enhanced security, convenience, and interoperability.
… of the WSEAS International Conferences: 2 nd …, 2006
The paper presents an application developed for Java Card smart cards, with multiapplication support. Although the multiapplication support was not exemplified, the use of smart card for personal identification has some advantages, the most important beeing its security. In this paper are shown the structure of the application, various security systems, which ensure the access to a objective to only the designated people, who have rights to enter in the certain objective.
Micro, IEEE, 1999
2008
The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
IJCSMC, 2019
In recent times, there has been a constant increase in usage of plastic cards, used for identification, banking and other such purposes. This technology has bolstered due to its easiness and transparency. It is based on the concept of Internet of Things (IoT). Every card has its specific details and identification factor with the help of which it is recognised. The other processes happen at the backend and the user is unaware of it. Earlier, a magnetic strip was used on each card, now it is being replaced by a micro chip embedded on the card. During financial transactions, security of the user's credentials is a crucial thing. If it is tampered with, results can be fatal.
Proceedings of the Seventh Workshop on Hot Topics in Operating Systems, 2000
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.